Newsletter

Networking Monitoring News – Jan 2016

CryptoWall 4.0

CryptoWall has caused massive damage and has infected scores of businesses and home user machines. CryptoWall 3.0 has made an estimated US $325 Million this year. The new version is pretending to be a resume inside a zipped e-mail attachment. These resumes, though, were actually JavaScript files that when executed would download an executable, save it to the Windows %Temp% folder, and then execute it. Make sure you have working back-ups and if you have something similar to a Network Appliance make sure you are making use of snapshots to help recover data.

If you are a ContentCatcher: Email customer we have blocked .js (JavaScript) files by default and can block a zip file containing these .js files at the first layer.

DELL

Researchers have found that if a website is configured in a certain way, an attacker can abuse a Dell self-signed certificate that comes installed on your Dell machines to extract a device-identifying code (Service Tag). This code could be useful information for carrying out tech support scams against your users.

The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing them to quickly identify the computer model.

Here is a link to the uninstaller that will remove this certificate.

https://dellupdater.dell.com/Downloads/APP009/eDellRootCertFix.exe

Ron Samson

Share
Published by
Ron Samson

Recent Posts

Cloud-Based EDR: Simplifying Security Management for IT Teams

In today's era of increasingly sophisticated cyberattacks, IT departments are always looking for effective ways…

1 month ago

EDR for Small Business: Key Features You Should Look For

In today's digital world, small businesses are an increasingly likely target for cybercriminals. With cyberthreats…

1 month ago

Advanced EDR: Key Benefits for Enterprises in 2025

In the rapidly evolving world of cybersecurity, businesses are increasingly seeking solutions that can protect…

1 month ago

How SOC as a Service Pricing Works: A Complete Breakdown

As businesses face an increasing number of cyber attacks, some are turning to Security Operations…

1 month ago

Managed SOC for MSP: Boosting Service Offerings and Revenue

In this age of digitization, security is not only necessary; it's a differentiator. For Managed…

1 month ago

24/7 Managed SOC vs In-House Security Teams: What’s the Best Choice?

In the contemporary digital era, cybersecurity is of high priority for small and large enterprises.…

2 months ago